MindMap Gallery CCNA official outline
CCNA official outline mind map, the main contents include: cross-routing data delivery, router security, router used as DHCP server, access to remote devices, etc.
Edited at 2022-06-25 22:55:20This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
CCNA Evening Class Official Outline
the second week
The sixth day
Data delivery across routes
router security
Router acts as DHCP server
Build a DHCP model on GNS3
Capture the four packets of DHCP
Access remote device
seventh day
Wan
The concept of WAN/Internet
Devices included in WAN
modem
effect
CSU/DSU
The difference between synchronous/asynchronous transmission
Various interfaces for WAN
Different types of switches
Several protocols of wide area network
Several switching methods of WAN
Access to WAN
packet switching
DSL concept
Asymmetric DSL/Symmetric DSL
Introduction to NAT
Introduction to PAT
WAN encapsulation
circuit switching
PSTN
leased line
PPP
Header format
Configure clock frequency
HDLC
Header format
Package configuration
packet switching
frame relay
cell exchange
ATM
Day 8
Routing principles
Static routing
advantage
High controllability
shortcoming
not flexible
dynamic routing
advantage
Easy to configure
Dynamic updates
shortcoming
Taking up router resources
Classful/classless routing
Static routing
concept
Configuration
The difference between next hop and outbound interface
Pay attention to the bidirectionality of static routing configuration
RIP
Understand dynamic routing protocols
The convergence process of dynamic routing protocols
Understand routing protocols and routed protocols
The concept of IGP and BGP
The concept/direction of routing entries is opposite to the direction of data transfer
Management Distance Review
Types of dynamic routing protocols
distance vector
mix
link status
Classful/classless routing protocols
Attributes
Upper layer protocol support
UDP 520
Classful routing protocol
VLSM is not supported
timer
Update timer 30
Timeout timer 180
Refresh timer 240
Suppress timer 180
metric
Hop count
multicast address
224.0.0.9
RIPv2
The difference between RIPv1/RIPv2
administrative distance
120
Configure RIP
Check routing
Review of dynamic routing protocols
Introduce the difference between IGP and EGP protocols
Dynamic routing protocol type
metric
administrative distance
distance vector routing protocol
Review the routing table synchronization process
The creation of a loop
Anti-ring mechanism
16 hops unreachable
The road is poisoned
toxicity reversal
Split Horizontally
trigger update
link state routing protocol
zoning concept
ninth day
CDP
Packaging format
Capture packets
Encapsulated directly in the link header
Contains information
Device ID
Software version
address
Peer interface ID
VTP domain name
duplex mode
Configuration
Global on/off
Interface on/off
test
show cdp neighbor
show cdp traffic
show cdp interface
Router startup configuration
Router hardware resources
Router boot sequence
ROM
POST function
BootStrap function
ROMMonitor function
Introduce the configuration register
How to deal with forgotten password problem
The device needs to find the order of IOS
1. Manually specify
boot system
2. Find the first available IOS in flash
3. Find available IOS on the tftp server
4. Enter miniIOS
5. Enter ROMMonitor
IOS is compressed and exists in Flash.
Configuration file saving path
1.RAM
2.NVRAM
3.tftp
configuration register
16 bits
last 4 bit group
Control the router's bootloader
0000: Enter ROMmonitor
0001: Enter miniIOS
0002-1111: Default boot sequence
The penultimate 4-bit group
Global 6th place
Control whether to load the configuration file in NVRAM
0: Load configuration file
1: Ignore configuration files
Manage Cisco devices
Brewing IOS
Save configuration to TFTP
Copy configuration from TFTP
experiment
debug command
tenth day
OSPF
Introduction to OSPF
SPF algorithm
Implementation process
metric
InterfaceCost
Calculation of measure values
The concept of router ID
Three tables maintained by OSPF
Topology
neighbor
route
5 types of data packages
Hello
DBD
LSU
LSR
LSAck
neighbor establishment process
7 state machines
Down, Init, Tow-way, Ex-start, Exchange, Loading, Full
Several important factors affecting the establishment of neighbors
OSPF in multi-access network
The concept of DR/BDR
election mode
Regional concept
Regional distribution principles
special router
ABR/ASBR
Configuration
1. Start the OSPF process
2. Declare the interface
OSPF load balancing
Default 4, maximum 16 equivalent
OSPF certification
Link authentication
Regional certification
Certification conditions
The authentication type is the same
Authentication password is consistent
OSPF inspection
show ip ospf
show ip ospf int
show ip ospf nei
show ip ospf da
the fourth week
Day 16
IPv6
Features
Large address space
Mobility/Flexibility
Simple head structure
Convenient conversion
Format
display method
writing skills
Address type
Unicast
multicast
arbitrary wave
Features
As recently as
address sharing
Router determines the closest path
unicast address
global unicast
link local
Automatically generated from MAC address
Automatic configuration of hosts
IPv6-IPv4 conversion
Dual stack
handmade tunnel
6-4 Tunnel Technology
IPv6 running routing protocol
RIPng
Features
Configuration
OSPFv3
EIGRP
The third week
the eleventh day
EIGTP
Features
Advanced distance vector
No class
Support VLSM
Reliable transmission
DUAL algorithm
Convergence speed
trigger update
single multicast combination
Multi-protocol module
three tables
neighbor list
topology table
routing table
5 types of data packages
hello
update
request
reply
ack
metric
Diffusion algorithm
Calculate loop-free paths/alternative paths
successor
feasible successor
FD
AD
feasible conditions
EIGRP certification
Only supports MD5 authentication
Key chain configuration
Enable EIGRP authentication
Configuration
Enter the EIGRP process
Announce EIGRP interface
Non-equivalent load balancing
two controlling factors
Manual aggregation
Troubleshooting commands
Check the EIGRP process
View EIGRP interface
View EIGRP neighbors
View the EIGRP topology table
The twelfth day
VLAN
concept
scope
2-1001
Trunk
concept
Package type
802.1q
Packaging format
ISL
The difference between the two
nativeVLAN
concept
effect
VTP
concept
three identities
server
client
transparent
respective functions
Synchronization rules
domain name
password
Configuration version number
run
VTP advertisements are sent for multicast
trigger update
Refresh every 5 minutes
Thirteenth day
Vlan&Routing
STP
PVST
fourteenth day
ACL
effect
1. Data filtering
1.1 Allow or deny packets passing through the router
1.2 Allow or deny VTY access from or to the router
2. Data classification
operating range
1. Source IP
2.Destination IP
3. Agreement number
4. Source port
5.Destination port
Application method
1.Apply in both directions of the interface
2. Apply on vty interface
Implementation process
First hit bounce rule
Three ACLs
1. Standard ACL
2. Extend ACL
3. Name the ACL
advantage
1. Convenient management
2. Entries can be deleted by serial number
Configuration guidelines
1. There can only be one ACL per interface, per protocol, and in each direction.
2. The specific ACL statement should be at the top
3. Create the ACL in global mode and then call it in interface mode
4. A deny all statement will always be hidden at the end of the ACL.
5. Extended ACLs should be deployed close to the source, and standard ACLs should be deployed close to the destination.
wildcard
ACL configuration
NAT
Day 15
WAN technology
PPP
two sub-layers
NCP
Responsible for network layer interface
Obtaining network layer address
LCP
Responsible for link negotiation
Responsible for certification negotiations
Two authentication methods
PAP
Features
Certification process
Configuration
CHAP
Features
Certification process
Configuration
Framerelay
the first week
first day
Network functions
network concept
Internet equipment
The role of the Internet
web-based application
Metrics of network quality
Physical topology/logical topology of the network
Several ways to connect to the Internet
network security
Closed network/open network
e-commerce security
Attacker/motivation/attack method
Common security threats
Easily resist password attack threats
OSI seven-layer model
non-standardized interconnection
Focus: The role of the OSI standard model
The role of layering
Example: Mailing a package
The role of setting standards
Focus: The functions of each layer
Focus: Data Link Layer
Packet capture introduces Ethernet header
Source MAC
Destination MAC
type
Explain the role of MAC address
Data is transmitted on the link in bits
Introduce the relationship between bit and Byte
Explain the binary system
Explain hexadecimal
Focus: Network layer
Packet capture introduces IP header
Source IP
Destination IP
Agreement number
Explain the role of IP address (corresponds to MAC address)
IP addresses are variable, MAC addresses are immutable
Logical nature of IP address and physical nature of MAC address
Briefly introduce the structure of IP address
Network number
host number
Focus: Transport layer
Packet capture introduces TCP header
Source port number
Destination port number
Explain the role of port number
Why establish a port-to-port connection?
A brief introduction to TCP/UDP
reliability
flow control
efficiency
Review the working principle of routers and switches
TCP/IP network layer
Network layer role
Let’s briefly introduce the IP address
Logically uniquely identifies the host
Divide the network
Detailed introduction to IP headers
Focus: logos, markers, sheet offsets
Explain IP address
Writing format/Computer format
category concept
reserved address
website address
Directed broadcast address
Network-wide broadcast address
loopback address
private address
Class A private
B is similar to
C is similar to
Focus: DHCP
complete process
Capture packets
Explain the two types of option fields of the four packages
What to do with two Servers
The role of DNS
TCP/IP transport layer
Several functions implemented by the transport layer
Comparison of TCP/UDP
Characteristics of TCP protocol
Focus: TCP header
The port number
Reliability guarantee: serial number/confirmation number
Flow control guarantee: window size
Connection-oriented guarantee: three-way handshake SYN set
Introducing the concept of positioning
Characteristics of UDP protocol
Unreliable
Efficient
UDP header
Mapping relationship from layer 3 to layer 4
Mapping relationship from layer 4 to layer 5
Key points: TCP three-way handshake
Why three handshakes are needed
Both ends confirm that the link is reliable back and forth.
process
Field changes
Capture packets
Focus: TCP confirmation mechanism
serial number
Confirmation Number
Focus: Sliding window mechanism
The role of window size
the next day
Data delivery for TCP/IP model
Data transmission across layer links
Data transmission across layer 2 devices
Data transmission across layer 3 devices
Focus: ARP protocol
Note: No network layer encapsulation
effect
Implementation process
Proxy ARP
Reverse ARP
Gratuitous ARP
Data transmission encapsulation/decapsulation process
ICMP principles
two fields
Type
Code
(ping) request package
Type 8
Code 0
(ping)reply
Type 0
Code 0
Focus: TraceRoute principle
Use TTL to control hop count
Use larger UDP port numbers to control peer replies
Use the ICMP type and code fields to determine whether it has arrived.
type11 code0: TTL timeout
type3 code3: The target port is unreachable
Ethernet
The concept of local area network
Several types of elements that make up a LAN
LAN functions
Several sizes of LAN
The development history of Ethernet
Ethernet two standards
The relationship between the data link layer and the physical layer
Ethernet2
802.3
LLC
DSAP
SSAP
MAC
The difference between the two
CSMA/CD
Half duplex principle
Mechanism: listen before transmitting, listen while transmitting, conflict detection, rewind and retransmit
16 discards
The origin of the minimum frame length of 64Byte
Maximum round trip time determines minimum frame length
Ethernet2/802.3 header structure
Unicast/Broadcast/Multicast
MAC address detailed explanation
top two
U/M bit
G/L position
OUI
VendorAssigned
Connect to Ethernet
Various Ethernet physical layer standards
Various interface specifications
Various media specifications
568A/568B line sequence standard
Line sequence rules between different devices
The third day
Challenges faced by shared LANs
Maximum length limit of network cable media
HUB amplifies the signal and solves the distance problem
The concept of conflict domain
Switch Matrix Concept
Leverage switching technology to solve these sharing problems
Switch resolves network conflicts
Switch functions
Cut-through forwarding on switch
Switch store and forward
Fragment-free forwarding on switches
Introducing the shortest frame length
Switch address learning process
Briefly describe the role of Vlan
Data delivery for switched networks
Basics of iOS
Device storage mechanism
Device startup process
Connect to device
Several operating modes
1. User mode
2. Privileged mode
The fourth day
Basic configuration of the switch
LED lights on the switch
Output when the switch is powered on
Several configuration modes of the switch
Assign a host name
Allocate a management IP
Configure a default gateway
Storage configuration
View Show some information
Version details
Interface details
Simple configuration of switch security
Threats to your device
Password configuration
console password
vty password
enable password
Password output encryption
Configure login flag banner
Remote login
telnet
SSH
Configure port security
Specify the MAC bound to the interface
statically specified
sticky specified
Verify the status of secure ports
When to use secure ports
Advantages of switches
Advantages of switches
How to avoid layer 2 loops
Simple troubleshooting of the switch
One level problem
Layer 2 protocol issues
fifth day
Routing function
Router structure
What does a routing table look like?
How does a router select a route?
Route table details
effect
source
Format
Several sources of routing tables
The role of metrics
Routing protocol classification
distance vector routing protocol
Common properties
Regularly updated
Neighbor
broadcast updates
All routing table updates
routing rules
Notification rules
Anti-ring mechanism
timer
Update timer
Expiration timer
Suppress timer
Route refresh timer
link state routing protocol
Common properties
link state diffusion
trigger update
link state database
SPF algorithm
routing algorithm
Calculate the loop-free shortest path
Update notice
Topology restoration
binary
slightly
IP Address Mechanism/VLSM
Turn on the router
Configure router
Five sub-modes
Configure hostname
Configure password
Interface configuration
Check the status of the interface